WO2007076418A2 - Supports numeriques a systeme de protection et procedes d'authentification de ceux-ci - Google Patents
Supports numeriques a systeme de protection et procedes d'authentification de ceux-ci Download PDFInfo
- Publication number
- WO2007076418A2 WO2007076418A2 PCT/US2006/062438 US2006062438W WO2007076418A2 WO 2007076418 A2 WO2007076418 A2 WO 2007076418A2 US 2006062438 W US2006062438 W US 2006062438W WO 2007076418 A2 WO2007076418 A2 WO 2007076418A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- article
- merchandise
- digital media
- security
- security tags
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2428—Tag details
- G08B13/2437—Tag layered structure, processes for making layered tags
- G08B13/2445—Tag integrated into item to be protected, e.g. source tagging
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00094—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers
- G11B20/00123—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised record carriers the record carrier being identified by recognising some of its unique characteristics, e.g. a unique defect pattern serving as a physical signature of the record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00166—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised contents recorded on or reproduced from a record carrier, e.g. music or software
- G11B20/00173—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving measures which result in a restriction to authorised contents recorded on or reproduced from a record carrier, e.g. music or software wherein the origin of the content is checked, e.g. determining whether the content has originally been retrieved from a legal disc copy or another trusted source
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00253—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
- G11B20/00275—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being stored on a chip attached to the record carrier
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/0021—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier
- G11B20/00217—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source
- G11B20/00253—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier
- G11B20/0034—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy involving encryption or decryption of contents recorded on or reproduced from a record carrier the cryptographic key used for encryption and/or decryption of contents recorded on or reproduced from the record carrier being read from a specific source wherein the key is stored on the record carrier the key being stored as a hologram
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B20/00—Signal processing not specific to the method of recording or reproducing; Circuits therefor
- G11B20/00086—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy
- G11B20/00876—Circuits for prevention of unauthorised reproduction or copying, e.g. piracy wherein physical copy protection means are attached to the medium, e.g. holograms, sensors, or additional semiconductor circuitry
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B27/00—Editing; Indexing; Addressing; Timing or synchronising; Monitoring; Measuring tape travel
- G11B27/10—Indexing; Addressing; Timing or synchronising; Measuring tape travel
- G11B27/11—Indexing; Addressing; Timing or synchronising; Measuring tape travel by using information not detectable on the record carrier
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2121—Chip on media, e.g. a disk or tape with a chip embedded in its case
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11B—INFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
- G11B2220/00—Record carriers by type
- G11B2220/60—Solid state media
- G11B2220/65—Solid state media wherein solid state memory is used for storing indexing information or metadata
- G11B2220/652—Solid state media wherein solid state memory is used for storing indexing information or metadata said memory being attached to the recording medium
- G11B2220/657—Memory in disc [MID]
Definitions
- This disclosure is related to articles of merchandise such as digital media, security measures that may be applied thereon and authentication thereof.
- conventional security tags may include a bar code disposed on an outer wrapping of an article of merchandise comprising an article of digital media such as a compact disc (CD).
- other types of security tags may include a uniquely colored CD, a CD which responds uniquely to lighting conditions such as black light, a pressed manufacturers identification number which may be pressed into a CD at the time of manufacturing, a number pressed onto a CD at a mass manufacturers as a secondary pressing process, and other physical markings on a CD that may be used for visual identification.
- Authentication of articles of merchandise using these types of security tags may comprise scanning a bar code, physical inspection, or employing a reader or translator to verify an alphanumeric code, for example.
- these conventional authentication methods may not adequately safeguard against counterfeit products.
- These conventional methods may employ relatively few security tags to perform authentication, and the few security tags may be frequently spoofed or defeated.
- FIG. 1 illustrates one embodiment of an article of merchandise comprising an article of digital media having a plurality of security tags co-located therewith
- FIG. 2 illustrates one embodiment of an article of merchandise comprising an article of digital media having a plurality of security tags co-located therewith;
- FIG. 3 illustrates one embodiment of an article of merchandise comprising an article of digital media having a plurality of security tags co-located therewith, and authentication of the article of digital media
- FIG. 4 illustrates one embodiment of an article of merchandise comprising an article of digital media having a plurality of security tags co-located therewith, and authentication of the article of digital media
- FIG. 5 illustrates one embodiment of an article of merchandise comprising an article of digital media having a plurality of security tags co-located therewith, and authentication of the article of digital media;
- FIG. 6 illustrates one embodiment of an article of merchandise comprising an article of digital media having a plurality of security tags co-located therewith, and authentication of the article of digital media;
- FIG. 7 is a flow diagram illustrating a process for validating an article of merchandise comprising an article of digital media according to one embodiment.
- a computing system such as a computer or a similar electronic computing device, that manipulates and/or transforms data represented as physical, electronic and/or magnetic quantities and/or other physical quantities within the computing system's processors, memories, registers, and/or other information storage, transmission, reception and/or display devices.
- a computing system refers to a system or a device that includes the ability to process and/or store data in the form of signals.
- a computing system in this context, may comprise hardware, software, firmware and/or any combination thereof. Further, unless specifically stated otherwise, a process as described herein, with reference to flow diagrams or otherwise, may also be executed and/or controlled, in whole or in part, by a computing system.
- Digital Media as referred to herein relates to articles of merchandise such as a storage medium adapted to store digital content.
- an article of digital media may comprise a magnetic disk, magnetic tape, recordable media including DVD and CD, including HD-DVD, CD-R, CD-RW, DVD-R, memory devices such as flash memory and/or semiconductor devices that may have embodied thereon digital content in a format that is retrievable in response to requests and/or commands, and may, in some contexts, be referred to as digital media.
- Digital Content as referred to herein relates to digital information stored in a storage medium in some retrievable format.
- digital content may comprise digital data embodied in a particular format, such as in one or more media formats such as MP3, MP4, WMA, WAV, EXE and MIDI formats.
- Security Tags as referred to herein relates to information that may be disposed on and/or co-located with articles of merchandise such as an article of digital media.
- Security tags may comprise, for example, information such as a manufacturers identification code, a content code, a digital watermark or an audio fingerprint, which may be co-located with an article of digital media by burning and/or pressing on a substrate, coupling Radio-Frequency Identification (RFID) circuitry to an article of digital media, or coupling a two or three-dimensional visual image, such as a hologram to an article of digital media, for example.
- RFID Radio-Frequency Identification
- authentication relates to determining whether the article is what it is presented as being.
- an authentication of an article may comprise comparing information associated with a security tag co-located with the article with information obtained from a second source, such as an authentication database.
- a second source such as an authentication database.
- authentication may be performed by correlating information obtained from a security tag with a second source other than a database.
- the second source may comprise any data source that may provide information that may be correlated to perform authentication functions, for example.
- one embodiment may be in hardware, such as implemented to operate on a device or combination of devices, for example, whereas another embodiment may be in software.
- an embodiment may be implemented in firmware, or as any combination of hardware, software, and/or firmware, for example.
- one embodiment may comprise one or more articles, such as a recordable media that may have stored thereon instructions, that when executed by a system, such as a computer system, computing platform, or other system, for example, may result in an embodiment of one or more methods illustrated herein being executed.
- a method of authenticating an article of digital media by authenticating security tags may be employed in a retail environment
- security tags are described as being "disposed on" an article of digital media, but the claimed subject matter is not so limited.
- security tags may be co-located with an article of digital media, meaning, for example, that the security tags may be proximate to the article of digital media.
- security tags may be co-located with an article of digital media by being disposed on retail packaging of the article of digital media.
- security tags may not be disposed on the article of digital media, but are co-located with the article of digital media.
- FIG. 1 there is illustrated a one embodiment of an article of merchandise having a plurality of security tags co-located therewith.
- Fig. 1 comprises an article of digital media 100, which may comprise a CD or DVD, for example. Again, however, these are merely examples of digital media according to a particular embodiment and the claimed subject matter is not limited in this respect.
- digital media 100 may comprise a CD or DVD, and may have digital content stored on track quadrants, for example.
- digital media may have disposed thereon a plurality of security tags.
- a media code 102 which may comprise an alphanumeric code in a particular embodiment, and may be pressed or burned on an index portion of the digital media 100 or within track quadrants designated for this purpose.
- a Manufacturers Identification (MID) Code 104 may be pressed on the digital media 100, such as at the time of manufacture.
- digital media 100 may include an inner ring 106 and hole 108.
- RFID circuitry 116 may be disposed on inner ring 106 and, additionally, a visual image 1 18 such as a 2-dimensional or 3- dimensional holographic image may be formed on inner ring 106 or on another portion of the digital media.
- An audio tag 1 10 may be burned or pressed into the digital media 100 on one or more track quadrants, for example.
- these are merely examples of how a security tag may be associated with digital media according to a particular embodiment, and the claimed subject matter is not so limited.
- Digital media 200 may comprise a CD or DVD, for example.
- Digital media 200 may have disposed thereon a plurality of security tags, such as a media code 202, a MID code 204, RFID circuitry 216, a visible graphic or mark 218, or an audio tag 210, for example.
- security tags may be co-located with the digital media 200 by use of a variety of techniques. For example, a media burner may be employed to bum digital content on the digital media 200, and may additionally be employed to form the media code 202 and/or audio tag 210 thereon.
- a manufacturer may employ a manufacturing process to form the media code 202, audio tag 210, MID code 204, RFID circuitry 216 or graphic or mark 218 on a burned digital media, for example.
- the manufacturing process may be employed after burning in the same fabrication process, or may be employed as a secondary manufacturing process, such as if the digital media is burned in a retail environment, for example.
- these are merely examples of how a security tag may be formed on digital media, and the claimed subject matter is not so limited.
- Digital media 300 may comprise a CD or DVD, for example.
- Digital media 300 may have disposed thereon a plurality of security tags, such as RFID circuitry 316 and/or a visible image 318.
- security tags such as RFID circuitry 316 and/or a visible image 318.
- authentication of digital media 300 may be performed by detecting information comprising a "signature" associated with digital media 300. Detecting a signature may comprise reading one or more security tags co-located with respect to digital media 300. For example, detecting a signature may comprise reading an RFID signal from RFID circuitry 316 to obtain RFID data.
- Reading an RFID signal may be performed by an RFID reader 302.
- the RFID data may be provided to a local computer 304, and may be employed to query database 306, which may be located on computer 304 and/or may be located on a computer remote from computer 304, such as a computer located at a physically different location that computer 304.
- the RFID data may be employed to query database 306, in order to authenticate digital media 300.
- database 306 may be queried with the RFID data in order to determine whether the RFID data is associated with an authentic article of digital media.
- digital media 300 may be authenticated by employing security tags.
- authentication may include displaying data on a display device (not shown) of the computer 304. Additionally, authentication may include printing a receipt or executing an audible signal, for example.
- digital media 400 has a MID code 404 formed thereon.
- the MID code 404 may be authenticated, in one embodiment, by employing a MID code reader 406 to read the MID code.
- MID code reader 406 may comprise a DVD or CD reader, for example.
- Data read from the MID code 406 may be provided to a local computer 408, and may be provided to database 410.
- the MID code may be authenticated by querying database 410, for example.
- digital media 400 may be authenticated by employing security tags.
- authentication may include displaying data on a display device (not shown) of the computer 408.
- authentication may include printing a receipt or executing an audible signal, for example.
- FIG. 5 there is illustrated an article of merchandise comprising an article of digital media 500 having a plurality of security tags co- located therewith.
- digital media 500 has RFID circuitry 516, a MID code 504, a media code 502 and an audio code 510 disposed thereon.
- authentication may be performed by use of a plurality of the security tags.
- an RFID signal from the RFID circuitry 516 may be read by an RFID reader 520.
- the MID code 504, media code 502 and/or audio code 510 may be read by a media reader 520, such as a CD or
- a reader may be adapted to read a plurality of security tags of differing types.
- a reader may be adapted to read an RFID signal from RFID circuitry 516, read the audio code 510, read the media code 502 and read the MID code 504, for example.
- the reader may be adapted to read these security tags substantially automatically in response to providing the digital media to the reader, for example.
- Data read from the security tags may be provided to a local computer 524, and may be provided to database 526.
- the MID code may be used to authenticate an article by querying database 526, for example. In this manner, digital media 500 may be authenticated by employing security tags.
- authentication may include displaying data on a display device (not shown) of the computer 524. Additionally, authentication may include printing a receipt or executing an audible signal, for example.
- the security tags may be logged and tracked into database 526, to enable physical location, retail destination and/or current status of digital media 500, such as sold, returned or destroyed, for example. Tracking may be performed by use of a tracking database (not shown).
- a retail outlet or manufacturer may utilize one or more unique security tags or a combination of security tags to identify and/or track digital media for one or more purposes. Referring now to Fig. 6, there is illustrated an article of merchandise comprising an article of digital media 600 having a security tag disposed thereon.
- digital media 600 has a visible image 618 formed thereon.
- digital media 600 may be authenticated upon authentication of visible image 618.
- Authentication of visible image 618 may be performed visually by a human eye 602.
- a verifier may be trained to recognize a valid visible image 618 or access a reference to authenticate visible image 618.
- the verifier may be capable of authenticating the digital media 600 by inspection of visible image 618.
- Fig. 7 is a flow diagram of a process 700 for authenticating security tags co-located on an article of merchandise according to an embodiment, to authenticate the article, for example.
- claimed subject matter is not limited in scope to this particular example.
- the order in which blocks are presented does not necessarily limit claimed subject matter to any particular order.
- an article is provided.
- the digital media may have one or more security tags co-located therewith, and may comprise one or more of the security tags described with reference to Figs 1 -6, for example.
- a signature of the article may be detected. Detecting a signature may comprise obtaining information from the one or more security tags co-located with the digital media.
- obtaining information from the one or more security tags comprises reading one or more security tags. Reading may be performed by physical inspection, by scanning by use of a scanning such as an RFID scanner or a reader which may be adapted to read a plurality of varying types of security tags, and/or other manners which may result in the detection and/or reading of security tags and/or information thereof.
- Detection and/or reading of security tags and/or information thereof may result in the obtaining of security tag information.
- an authentication database is accessed.
- the authentication database may be utilized to authenticate an article based, at least in part, the security tag information.
- the security tag information may be employed to authenticate the article including the security tag.
- an authentication of security tag information is performed, and, accordingly, authentication of the article is performed.
Abstract
Les modes et formes de réalisation de l'invention concernent des procédés, des dispositifs et/ou des systèmes destinés à des supports numériques à système de protection ainsi que des procédés d'authentification de ceux-ci.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US75218705P | 2005-12-20 | 2005-12-20 | |
US60/752,187 | 2005-12-20 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2007076418A2 true WO2007076418A2 (fr) | 2007-07-05 |
WO2007076418A3 WO2007076418A3 (fr) | 2008-12-04 |
Family
ID=38218820
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2006/062438 WO2007076418A2 (fr) | 2005-12-20 | 2006-12-20 | Supports numeriques a systeme de protection et procedes d'authentification de ceux-ci |
Country Status (2)
Country | Link |
---|---|
US (2) | US20070171066A1 (fr) |
WO (1) | WO2007076418A2 (fr) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013044037A1 (fr) * | 2011-09-23 | 2013-03-28 | Thomson Licensing | Procédé et système d'authentification et de sécurité de disque |
US11213773B2 (en) | 2017-03-06 | 2022-01-04 | Cummins Filtration Ip, Inc. | Genuine filter recognition with filter monitoring system |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007076418A2 (fr) * | 2005-12-20 | 2007-07-05 | Panifare Union, Llc | Supports numeriques a systeme de protection et procedes d'authentification de ceux-ci |
US8375215B2 (en) * | 2006-11-07 | 2013-02-12 | Lexmark International, Inc. | Source selection apparatus and method using media signatures |
US7789314B2 (en) * | 2007-08-28 | 2010-09-07 | International Business Machines Corporation | Protection of optically encoded content using one or more RFID tags embedded within one or more optical medias |
JP2011158788A (ja) * | 2010-02-02 | 2011-08-18 | Sony Corp | ホログラム付き媒体、ホログラム付き媒体製造装置および情報判定方法 |
US8903847B2 (en) * | 2010-03-05 | 2014-12-02 | International Business Machines Corporation | Digital media voice tags in social networks |
US20120091195A1 (en) * | 2010-10-14 | 2012-04-19 | Sony Dadc Us Inc. | Loss prevention system with covert marks and method of manufacture thereof |
JP2012173300A (ja) * | 2011-02-17 | 2012-09-10 | Sony Corp | ホログラム付き媒体、ロール状媒体、判別装置およびホログラム付き媒体製造装置ならびに情報判定方法 |
US20120246238A1 (en) | 2011-03-21 | 2012-09-27 | International Business Machines Corporation | Asynchronous messaging tags |
US20120244842A1 (en) | 2011-03-21 | 2012-09-27 | International Business Machines Corporation | Data Session Synchronization With Phone Numbers |
US8688090B2 (en) | 2011-03-21 | 2014-04-01 | International Business Machines Corporation | Data session preferences |
US10569171B2 (en) * | 2012-07-02 | 2020-02-25 | Disney Enterprises, Inc. | TV-to-game sync |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050134436A1 (en) * | 2003-12-19 | 2005-06-23 | George Brookner | Multiple RFID anti-collision interrogation method |
US20050201450A1 (en) * | 2004-03-03 | 2005-09-15 | Volpi John P. | Interrogator and interrogation system employing the same |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US574036A (en) * | 1896-12-29 | Lifting-jack | ||
US5745036A (en) * | 1996-09-12 | 1998-04-28 | Checkpoint Systems, Inc. | Electronic article security system for store which uses intelligent security tags and transaction data |
US6005940A (en) * | 1997-05-16 | 1999-12-21 | Software Security, Inc. | System for securely storing and reading encrypted data on a data medium using a transponder |
US7038985B2 (en) * | 2004-02-17 | 2006-05-02 | Sony Corporation | System using radio frequency identification (RFID) for copy management of digital media |
AU2005217966B2 (en) * | 2004-02-20 | 2008-05-22 | Checkpoint Systems, Inc. | System and method for authenticated detachment of product tags |
US7317396B2 (en) * | 2004-05-26 | 2008-01-08 | Funai Electric Co., Ltd. | Optical disc having RFID tag, optical disc apparatus, and system for preventing unauthorized copying |
US7496026B2 (en) * | 2004-12-11 | 2009-02-24 | Hewlett-Packard Development Company, L.P. | Optical disc and method of printing optical disc |
US7457952B2 (en) * | 2004-12-16 | 2008-11-25 | Xerox Corporation | Authentication tag for S/W media |
US20060230463A1 (en) * | 2005-04-07 | 2006-10-12 | International Business Machines Corporation | Method, apparatus, and computer program product for controlling copying and playback of digital data |
US7513436B2 (en) * | 2005-06-30 | 2009-04-07 | Symbol Technologies, Inc. | Apparatus and methods for optical representations of radio frequency identification tag information |
WO2007076418A2 (fr) * | 2005-12-20 | 2007-07-05 | Panifare Union, Llc | Supports numeriques a systeme de protection et procedes d'authentification de ceux-ci |
-
2006
- 2006-12-20 WO PCT/US2006/062438 patent/WO2007076418A2/fr active Application Filing
- 2006-12-20 US US11/613,953 patent/US20070171066A1/en not_active Abandoned
-
2009
- 2009-10-21 US US12/603,091 patent/US20100066489A1/en not_active Abandoned
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050134436A1 (en) * | 2003-12-19 | 2005-06-23 | George Brookner | Multiple RFID anti-collision interrogation method |
US20050201450A1 (en) * | 2004-03-03 | 2005-09-15 | Volpi John P. | Interrogator and interrogation system employing the same |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013044037A1 (fr) * | 2011-09-23 | 2013-03-28 | Thomson Licensing | Procédé et système d'authentification et de sécurité de disque |
US9117487B2 (en) | 2011-09-23 | 2015-08-25 | Thomson Licensing | Method and system for disc authentication and security |
US11213773B2 (en) | 2017-03-06 | 2022-01-04 | Cummins Filtration Ip, Inc. | Genuine filter recognition with filter monitoring system |
Also Published As
Publication number | Publication date |
---|---|
US20070171066A1 (en) | 2007-07-26 |
WO2007076418A3 (fr) | 2008-12-04 |
US20100066489A1 (en) | 2010-03-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20070171066A1 (en) | Security-enabled digital media and authentication methods thereof | |
TWI397067B (zh) | 致能存取控制的物品與系統、控制存取的方法、及包含儲存有指令之儲存媒體的物品 | |
US7038985B2 (en) | System using radio frequency identification (RFID) for copy management of digital media | |
KR100785765B1 (ko) | 제품인증 방법 및 그 장치 | |
US8352582B2 (en) | Temporal proximity to verify physical proximity | |
CA2766644C (fr) | Support optique avec ajout de descripteur pour reduire la contrefacon | |
CN101416246A (zh) | 使用标识符标签和真实性证书、用于检测伪造的或者盗用的品牌物品的方法和系统 | |
US20090320139A1 (en) | Transponder incorporated into an electronic device | |
BR9714594A (pt) | Processo para limitar acesso a dados armazenados em um meio, disco óptico para uso em um sistema de leitura óptica de um computador, artigo de manufatura, processo e aparelho para limitar o uso de informações armazenadas em um meio e meio de armazenagem | |
US11521156B2 (en) | Trustable product delivery with RFID and smart chip | |
CN1831838A (zh) | 软件媒体的认证标签 | |
JPH11259975A (ja) | ディスク状記録媒体及びその偽造品検出装置、再生装置並びに製造装置 | |
TW200846973A (en) | Optical DNA | |
JP2006501547A (ja) | 一時光学状態変化材料を用いる商品の認証 | |
WO2009005296A2 (fr) | Système et procédé de traitement de certification de contenus numériques et support lisible par ordinateur sur lequel se trouve un programme exécutant une fonction correspondante | |
US8713708B1 (en) | Method and apparatus for controlling the use of data stored on a media sample | |
WO2006016514A1 (fr) | Méthode et disque de gestion de contenu d’un disque | |
US9142250B2 (en) | System and method for preventing illegal copy | |
JP2014531697A (ja) | ディスク認証及び安全性のための方法及びシステム | |
US20070150969A1 (en) | Method For Producing An Anti-Theft/Anti-Copy Optical Medium | |
US8983077B2 (en) | Media storage, media reader and method for reading contents of the media storage in the media reader | |
KR20080104474A (ko) | 무선 식별 태그 기반 디지털 컨텐츠 처리 장치 및 무선식별 태그 기반 디지털 컨텐츠 처리 방법 및 이를실현시키기 위한 프로그램을 기록한 컴퓨터로 판독 가능한기록 매체 | |
TWM572500U (zh) | 利用無線射頻標籤之防偽系統 | |
JP2006294234A (ja) | ディスク状記録媒体の再生装置 | |
TW202016801A (zh) | 利用無線射頻標籤之防偽系統 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 06846733 Country of ref document: EP Kind code of ref document: A2 |